How to perform a point in time restoration using ZRM for MySQL
ZRM for MySQL is a powerful, flexible and robust backup and recovery solution for MySQL databases for all storage engines. With ZRM for MySQL a Database Administrator can automate logical or raw backup to a local or remote disk. In this How To, we attempt to explain how to recover from an user error at any given point in time.

Step-By-Step Configuration of NAT with iptables
This tutorial shows how to set up network-address-translation (NAT) on a Linux system with iptables rules so that the system can act as a gateway and provide internet access to multiple hosts on a local network using a single public IP address. This is achieved by rewriting the source and/or destination addresses of IP packets as they pass through the NAT system.

Step-by-Step IPP based Print Server using CUPS
This tutorial describes how to install a Linux print server with CUPS. It also covers the installation and configuration of printer drivers on the print server as well as the printer setup on a Windows 2000 client.

Racoon Roadwarrior Configuration
Racoon Roadwarrior is a client that uses unknown, dynamically assigned IP addresses to connect to a VPN gateway (in this case also firewall). This is one of the most interesting and today most needed scenarios in business environment. This tutorial shows how to configure Racoon Roadwarrior.

Integrate Thunderbird with Active Directory
To integrate Thunderbird to the AD, you must already have installed and configured Kerberos and Samba so that you can use the net ads to obtain the information you need. There are a lot of documentation out there to get to that point. I will just highlight the main points for the sake of completeness.

Creating .deb-Packages With
Checkinstall
Checkinstall is a nice tool to create simple .deb-packages that
you can use in your local network (e.g. if you have to install the
same piece of software on multiple computers running Debian). It
lets you compile and install software from the sources like before,
but with the difference that you end up with a simple Debian
package which also means that you can easily uninstall the software
you just compiled by running dpkg -r!

How to Build an Effective Mail Server Defense When speaking of mail server-related security, one
tends to limit the issue to message applied security measures, and even
more to Antivirus and Antispam protection. This is however only one
stage in the more complex process of securing your server. This article
aims at identifying and explaining all security layers, highly important when choosing a certain mail server and consequently when configuring and using it.

On a standard SuSE 8.2 installation the quota module is not
loaded into the kernel which is why
quotaon -avug
gives back an error.
Load the quota module manually with
insmod quota_v1
and
insmod quota_v2
To have those modules loaded on every bootup of the system
please insert
modprobe quota_v1
and
modprobe quota_v2
in
/etc/init.d/boot.local.

First, you have to enable quota on your system. Have a look at the
quota section of the appropriate "Perfect Setup" tutorial for your
distribution on HowtoForge.
After you've enabled quota on your system:
To set quotas for a user or group, use the setquota command (see
man setquota
for more information), e.g.:
setquota -g $group $blocks $blocks 0 0 -a
setquota -u $username $blocks $blocks 0 0 -a
Replace $group, $username and $blocks. Note: $blocks is the quota size
in MB * 1024! To deactivate quotas for a user or group, run these
commands and set $blocks to 0.